Threat Level: green Handler on Duty: Didier Stevens

SANS ISC: Vulnerability in FireFox 3.5.1 confirmed, exploit PoC, no patch - SANS Internet Storm Center SANS ISC InfoSec Forums

Watch ISC TV. Great for NOCs, SOCs and Living Rooms:

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Vulnerability in FireFox 3.5.1 confirmed, exploit PoC, no patch

Various analysts and sites have recently confirmed a vulnerability is present in FireFox 3.5.1 that has had exploit PoC released. When exploited, the vulnerability can lead to system compromise or induce a DOS. No Patch is available.

Mozilla Firefox 3.5 Unicode Data Remote Stack Buffer Overflow Vulnerability



193 Posts
Jul 18th 2009
Will no script act as a work around ?
eEye says "Note: Although Javascript access can be restricted with applications such as the NoScript Add-On, it may still be possible for the browser to be exploited if an untrusted website is loaded (with/without the consent of the user, for example, via XSS or compromised-whitelisted website)" and rates this as a Medium Risk, all other sites I checked rate this at their highest risk. HTH

193 Posts
eEye is ignorant or purposely misleading here: NoScript features the first and best client-side anti-XSS protection, therefore running JavaScript code from an untrusted website "without the consent of the user" is practically impossible...
4 Posts
Thanks for the comment on the FF anti-XSS protection Giorgio. FWIW, I do not interpret their work as ignorant or misleading, they're correct and probably the only analysts that point out to users how you might get exploited even with "applications such as" NoScript. Compromised "Whitelisted" websites deserve mentioning too, for those that rely heavily in "Trusted" options in browsers and apps like NoScript.

193 Posts
It is things like this that make me truly wish the Firekeeper add-on would get out of the experimental phase. It uses snort-like rules to analyze pages and look for questionable activity.

93 Posts

Sign Up for Free or Log In to start participating in the conversation!